A protection schedule defines when backups are transferred from protected machines to the Rapid Recovery Core. Protection schedules are initially defined using the Protect Machine Wizard or the Protect Multiple Machines Wizard.
You can modify an existing protection schedule at any time from the Summary page for a specific protected machine.
|
NOTE: For conceptual information about protection schedules, see Understanding protection schedules. For information about protecting a single machine, see Protecting a machine. For information about bulk protect (protecting multiple machines), see About protecting multiple machines. For information on customizing protection periods when protecting an agent using either of these wizards, see Creating custom protection schedules in Simple Mode. For information about modifying an existing protection schedule, see Creating multiple protection schedule periods in Advanced Mode. |
Complete the steps in this procedure to modify an existing protection schedule for volumes on a protected machine.
Initially, all volumes share a protection schedule.
To select all volumes at once, click in the checkbox in the header row. Click on (Protection Group) to expand the volumes being protected, so you can view all volumes and select one or more.
|
NOTE: It is best practice to protect, at minimum, the system reserved volume and the volume with the operating system (typically the C:/ drive). |
If you want to save a new protection schedule as a template, click Advanced mode, and then continue to step 4.
For example, use the arrows to show a time of 08:00 AM.
For example, use the arrows to show a time of 06:00 PM.
A blue bar provides a visual representation of this interval.
For example, set a start time of 12:00 AM and an end time of 07:59 AM.
|
NOTE: If you want to remove a period you added, click the trash icon to the far right of that period, and then click Yes to confirm. |
For more information, see Understanding protection schedules.
When you pause protection, you temporarily stop all transfers of data from the selected machine to the Rapid Recovery Core. You can pause protection for any protected machine:
If you pause protection using the Protect Machine Wizard or the Protect Multiple Machines Wizard, protection is paused until explicitly resumed. If protection is paused using this procedure, you are prompted to specify whether to pause until resumed, or to pause for a designated amount of time (specified in any combination of days, hours and minutes).
If protection for a machine is paused, and you force a snapshot, a single backup snapshot is captured. If it is the first backup, a base image is captured; otherwise an incremental image is captured. Until you explicitly resume protection using this procedure, paused protection remains suspended.
You can resume protection for any paused protected machine:
Use the procedure below to pause or to resume protection, as appropriate.
The Pause Protection dialog box appears.
The Resume Protection dialog box appears.
The Resume Protection dialog box closes, and protection is resumed for all machines.
The Pause Protection dialog box appears.
The Resume Protection dialog box appears.
The Resume Protection dialog box closes, and protection is resumed for the selected machine.
The Summary page displays for the selected machine.
The Pause Protection dialog box appears.
The Resume Protection dialog box closes, and protection resumes for the selected machine.
You can add two or more Windows machines for protection on the Rapid Recovery Core simultaneously using the Protect Multiple Machines Wizard. To protect your data using Rapid Recovery, you need to add the workstations and servers for protection in the Rapid Recovery Core Console; for example, your Exchange server, SQL Server, Linux server, and so on.
As with protecting individual machines, protecting multiple machines simultaneously requires you to install the Rapid Recovery Agent software on each machine you want to protect.
|
NOTE: As an exception to this rule, if protecting virtual machines on a VMware/ESXi or Hyper-V host, you can use agentless protection. For more information, including restrictions for agentless protection, see Understanding Rapid Snap for Virtual. |
Protected machines must be configured with a security policy that makes remote installation possible.
To connect to the machines, they must be powered on and accessible.
There is more than one method to deploy the Agent software to multiple machines simultaneously. For example:
The process of protecting multiple machines includes optional steps that you can access if you select an advanced configuration. Advanced options include repository functions and encryption. For example, you can specify an existing Rapid Recovery repository to save snapshots, or you can create a new repository. You can also specify an existing encryption key (or add a new encryption key) to apply to the data saved to the Core for the machines you are protecting.
The workflow of the Protect Multiple Machines Wizard may differ slightly based on your environment. For example, if the Rapid Recovery Agent software is installed on the machines you want to protect, you are not prompted to install it from the wizard. Likewise, if a repository already exists on the Core, you are not prompted to create one.
When protecting multiple machines, follow the appropriate procedure, based on your configuration. See the following options for protecting multiple machines:
The protecting procedure requires the following tasks be completed before you begin:
Use this procedure to simultaneously protect one or more machines on an Active Directory domain.
The Protect Multiple Machines Wizard opens.
Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option Skip this Welcome page the next time the wizard opens.
Text Box | Description |
---|---|
Host | The host name or IP address of the Active Directory domain. |
User name | The user name used to connect to the domain; for example, Administrator or, if the machine is in a domain, [domain name]\Administrator). |
Password | The secure password used to connect to the domain. |
The system automatically verifies each machine you selected.
If the Protection page appears next in the Protect Multiple Machines Wizard, skip to step 12.
If the Agent software is not yet deployed to the machines you want to protect, or if any of the machines you specified cannot be protected for another reason, then the selected machines appear on the Warnings page.
|
NOTE: Quest recommends this option. You must restart agent machines before they can be protected. |
The Protection page appears.
You can enter up to 64 characters. Do not use the special characters described in the topic prohibited characters. Additionally, do not begin the display name with any of the character combinations described in the topic prohibited phrases.
With a default protection schedule, the Core will take snapshots of all volumes on the protected machine once every hour. To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary page for the specific protected machine.
Schedule options are added to the wizard workflow.
|
NOTE: It is best practice to protect, at minimum, the system reserved volume and the volume with the operating system (typically the C:/ drive). |
Text Box | Description |
---|---|
Name | Enter a name for the encryption key.
Encryption key names must contain between 1 and 64 alphanumeric characters. Do not use prohibited characters or prohibited phrases. |
Description | Enter a descriptive comment for the encryption key. This information appears in the Description field when viewing a list of encryption keys in the Rapid Recovery. Descriptions may contain up to 254 characters.
Best practice is to avoid using prohibited characters and prohibited phrases. |
Passphrase | Enter a passphrase used to control access.
Best practice is to avoid using prohibited characters. Record the passphrase in a secure location. Quest Data Protection Support cannot recover a passphrase. Once you create an encryption key and apply it to one or more protected machines, you cannot recover data if you lose the passphrase. |
Confirm passphrase | Re-enter the passphrase. It is used to confirm the passphrase entry. |
NOTE: This option is enabled by default, so if you do not want to encrypt data in this fashion, clear this option. |
|
NOTE: The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) transfers to the repository indicated in your Rapid Recovery Core following the schedule you defined, unless you specified that the Core should initially pause protection. For information on pausing and resuming protection, see Pausing and resuming protection. |
The Rapid Recovery Agent software is deployed to the specified machines, if necessary, and the machines are added to protection on the Core.
© ALL RIGHTS RESERVED. Termini di utilizzo Privacy Cookie Preference Center